Cryptography of the Cryptocracy: Of Gods and Computers

Thoth, Egyptian deity of writing.

Thoth, Egyptian deity of writing.

By: Jay Dyer

In January of 2014, IMF Chief Christine Lagarde gave a speech that was lost on most of her audience and amongst the media. She stated:

“Now, I’m going to test your numerology skills by asking you to think about the magic seven, okay? Most of you will know that seven is quite a number in all sorts of themes, religions. And I’m sure that you can compress numbers as well. So if we think about 2014, all right, I’m just giving you 2014, you drop the zero, 14, two times 7. Okay, that’s just by way of example, and we’re going to carry on. So 2014 will be a milestone and hopefully a magic year in many respects. It will mark the hundredth anniversary of the First World War back in 1914. It will note the 70th anniversary, drop the zero, seven– of the Breton Woods conference that actually gave birth to the IMF.”

In his classic Secret Societies and Psychological Warfare, Hoffman wrote of coincidence, synchronicity and curious connections between 007 and 2001 that also relate to obscure subjects like numerology and gematria.  The first 007 was Dr. John Dee, as will be investigated below, but the reason this is of import is the similarity between Christine Lagarde’s seemingly strange comments to her Press Club audience.  Hoffman has recently commented on this, and I myself at the time of Lagarde’s comment speculated on the connections between the numbers of sevens that appeared in the downed Malaysian Plane incident(s).  Numerous conspiracy sites and speculators got in on the action, but what no one (other than Hoffman) did was look at the motivations behind such a mindset.  The natural approach of those in conspiratorial and alternative media circles would be to leap at the occult.  While I don’t intend to deny such associations, I would like to highlight another element that almost none have considered.  Yes, there are believers in dark forces in high places, but there is also another factor that should be kept in mind, as I myself had conversations with individuals about this that appeared a frightened by such calculating mumbo jumbo.

Simon Singh, in his recent The Code Book, explains of the process of cracking ciphers and codes as follows:

“Kerchoff’s Principle: The security of a crypto-system must not depend on keeping secret the crypto-algorithm.  The security depends only on keeping secret the key.  In addition to keeping the key secret, a secure cipher system must also have a wide range of potential keys.” (The Code Book, Simon Singh, pg. 12)

As researchers and analysts of the world-historical, we attempt to do just this on a much grander scale.  Discovering the secrets of nature and supernature yield fulfilling mental rewards in their own right, but they also free us from the slavery to superstition.  While I have attacked the Enlightenment many times over, and I think I am right in doing so for its excesses, it’s also worth considering the positive aspects of the Enlightenment, which did serve to rid the Roman dominated West of numerous bizarre superstitions and excesses that should not be excused.  I doubt many of us in modernity would truly like to return to a world where we expect to almost certainly be damned, spending our days working out a complex system of penitential indulgences to try to settle debts in an absurd punishment-based system.  Such is part of my reason for leaving Western Christianity years ago, but this should also not be seen as endorsement of one side of a false western dialectic of Rome versus Enlightenment.  On the contrary, the truth lies somewhere in-between extremes that the cunning of history is yet to work out (as we still live under the excesses of the quantification-obsessed Enlightenment).  Let us see if we can locate at least one key to cracking the code of our modern overlords and decipher the Lagardian linguistic mysteries, surveying numerology, biblical gematria and cryptography.

First, the subjects of numbers, numerology and ancient perspectives on them, are helpful.  For ancient man, numbers were magical, semi-divine entities that somehow related to all things, despite being in no particular time and locale.  Obviously in an article, the scope of such an analysis must be limited, so I have chosen influential representative examples.  My friend James Kelley explains in his “Prajapati Purusa and Vedic Altar Construction” essay the means by which the Pythagorean Theorum was actually encoded in Vedic altar designs, much earlier than Pythagoras himself:

Simon Singh's The Code Book.

Simon Singh’s The Code Book.

“This blurb fails to mention the amazing insights of Dr. Abraham Seidenberg, who found the so-called “Pythagorean theorem” at work in the Indian texts known as the Sulvasūtras, which date from the 8th century B.C., but which crystallize procedures and teachings that reach back into the Neolithic mists.  Though historians of mathematics before Seidenberg noted the connection between the famous theorem and Vedic texts, it is our contention that Dr. Seidenberg was the first to offer a coherent presentation of the significance of this influence. The Sulvasūtras contain explicit instructions for how to construct the altars for Vedic worship using only ropes, stakes, and possibly rods. But what has Vedic altar worship to do with  “a² + b² = c²”?

In his seminal article “Ritual Origin of Geometry,” Seidenberg demonstrates exactly how the “Pythagorean theorem” was used in creating the falcon-shaped altar used in the Vedic fire ritual, the agnicayana.  The altar was built based upon an aerial measure called a “Purusa”! The falcon altar, we are told in the sutra, must be a square with an area of 7 ½ square Purusas (about 56 ¼ square feet). A śulba, or cord, is used to measure out a “Purusa” (about 7 ½ feet, and marked on a section of the cord from an end), and this section is stretched taut between two pegs, one end of the pegged-down cord extending out past a peg, the other end being a meeting point of peg and cord-end.  Next, the loose cord is stretched back and wrapped around the apposite peg. This peg-to-peg cord stretch is repeated until the desired length is reached (to achieve the “half Purusa,” the initial Purusa-length has been measured by joining both ends of the section and pulling the loop taut by hand and marking the new end with chalk or ink).

The square is created next, in a manner that we would find odd, by stretching a second cord from the midpoint of the initial 7 ½ Purusa cord, the end result being a “T” shape.  Then the altar boundary parallel to the initial side is stretched, making an “H,” the final step being a simple stretching of two boundaries parallel to the central connecting cord.  It is not important to trace the subsequent “unnecessary” (from our “practical” perspective) steps in creating a square that is 7 ½ Purusa by 7 ½ Purusa (we moderns would simply stretch the loose cord, once measured, to make a 7 ½ Purusa “L,” then repeat the process twice more to get a square).  Instead, our attention must be focused upon what the Vedic priests did next:  They believed that it was necessary to increase the area of the altar by 1 Purusa, without changing the altar’s shape!”

In this fascinating and illustrative section we have an important insight that is lost on many: the primal and archetypal rites of ancient man, in what might be considered a serious contender for the origin of the “perennial tradition” (India), we see that the rites of the gods here encode mathematical forumlae.  Specifically in this case, the message is a geometrical formula, and in fact the most famous one.  While one is left to speculate on his own as to the divine status of such “gods,” what can be divined from this section is the fact that the ritual encodes a mathematical form and functions as a veil for a more axiomatic principle.  This seems to suggest a conscious desire to cloak abstract principles from the profane by the priestclass, keeping the secrets from the populace through religious fear.

Continuing with this survey of ancient thought, Egyptologist Wim van den Dungen analyzes the Pythagorean and Western conceptions of basic number principles and numerology.  Dungen’s linked chart also demonstrates the similarity in the various religious traditions through the numerological principles.  We see again the theme of hiding numerological doctrines under the divine:

“The first standard is immanent. Using the first ten cardinal numbers of N, the set of all natural numbers, the decadic set N’ {1, 2, 3, 4, 5, 6, 7, 8, 9, 10} is isolated (cf. Pythagorism based on Ancient Egyptian thought and later replicated by the Qabalah). By means of N’, all subsequent natural numbers can be derived. Each cardinal number of N’ is then coupled with a symbol one-to-one. These combinations give form to the famous neo-Platonic formula : exitus a Deo, reditus in Deum (outgoing from and return to God). This “numerology” is backed by a process in which the “exit” is an involution (a materialization of spirit) and the “return” an evolution (a spiritualization of matter). Immanence and the realms of process (becoming) prevail.

The second standard is transcendent. Transcendence is approached with negatives (radical apophatism). Three kinds emerge : unknowing itself, virtuality (the possible, or {Ø}) and nothingness (the void, or “0”). The first is a nothingness with potential, the second the non-existent (cf. Nature abhors a void). The set of all relevant criteria of measurable differences is given 10 ordinal positions defining 10 dimensions. The logic of creation (transcendence into immanence and vice versa) links with this.” (Van Den Dungen, “Tabularm Esotericum”)

Platonic forms.

Platonic forms.

In another influential example, the first century collection of documents known as the Corpus Hermeticum relates these numbers to the original creation act, echoing the same Indian, Hellenic and Egyptian principles:

“I saw in the darkness of the deep, chaotic water without form permeated with a subtle intelligent breath of divine power, Atum’s Word fell on fertile waters making them pregnant with all forms.  Ordered by the harmony of the Word, the four elements came into being, combining to create the brood of living creatures the fiery element was articulated [aether] as the constellations of the stars, and the gods of the seven heavenly bodies, revolving forever in celestial circles.  The Word leapt up from the elements of Nature and reunited with the mind of the Maker, leaving mere matter devoid of intelligence….

In the beginning there is unity.  Unity separates into two fundamental forces, which like negative and positive poles of a battery, generate everything.  Hermes describes them as Life and Light, which become Mind and Soul.  We experience them as thoughts and feelings.”   (The Hermetica, By; Timothy Freke and Peter Gandy, pgs. 13, 14, 35)

This tradition would continue in the Jewish and biblical tradition, as van den Dungen expounded, with Kabbalah and gematria.  In Kabbalah, the first ten numbers, like in Pythagoreanism, correspond to the divine energies or attributes that shine forth from the One (or God).  With this belief, ancient Jewish belief considered the very letters of the Torah to be divinely inspired and their particular forms and lexical constructs could encode secret meanings.  Jewish scholar and Kabbalah expert Gershom Scholem defines gematria as follows:

Gematria (from Gr. geometria), is one of the aggadic hermeneutical rules for interpreting the Torah (in the Baraita of 32 Rules, No. 29).  It consists of explaining a word of group of words according to the numerical value of the letters, or of substituting other letters of the alphabet for them in accordance with a set system.  Whereas a word is normally employed in this sense of manipulating according to a numerical value, it is sometimes found with the meaning of “calculations” (Avot 3:18)….The use of letters to signify numbers was known to the Babylonians and the Greeks.  The first use of gematria occurs in an inscription of Sargon II (727-707 B.C.E.) which states that the king built the wall of Khorsabad 16,283 cubits long to correspond with the numerical value of his name.  The use of gematria was widespread in the literature of the magi and among interpreters of dreams in the Hellenistic world.” (Gershom Scholem, Kabbalah, pg.  337)

What is relevant to our analysis of Lagarde’s comments is that we begin to see that the learned and priest classes would naturally see the pragmatic usage of gemtaria and numerology for conveying messages in a covert fashion.  Espionage and statecraft have always gone hand in hand, and the desire of rulers to send encrypted messages is an ancient art.  Thus, religious traditions and languages (such as Hebrew and Greek) where letters also functioned as numbers would naturally serve as a medium for secret communications.

Given Lagarde’s comments involve a peculiar focus on sevens, it might be worthwhile to look, not just at the hermeneutical principle of gematria, but at the symbology in Scripture of the number seven.  Seven serves to convey the idea of completion, finality and perfection, as the Oxford Bible Companion relates:

Number Symbolism. In common with most people in the ancient world, the Israelites attached symbolic significance to numbers.  So whenever the biblical writers mention a number, it is likely that they had a symbolic meaning in mind; in many cases the numbers must not be taken in their literal sense at all….

Seven. The sum of three plus four, of heaven and of earth, signifies completeness and perfection.  There were seven chief heavenly bodies (sun, moon and the five planets known to ancients), seven days of the week, seven archangels.  The great festivals lasted seven days, and there were seven weeks between the Passover and the Festival of Weeks (Pentecost).  Every seventh year was a Sabbath year, when the land would lie fallow, and Hebrew slaves were allowed to go free; and every fiftieth year was a jubilee, when alienated property had to be returned.  The seventh day represented God’s completed work (Gen. 2:2-3), and in the Book of Revelation, the seventh seal, trumpet, bowl, etc., represent the completion of God’s plan.  The seven spirits of God (Rev. 1-4) represent either the seven archangels, or “all spirits,” of the Holy Spirit.  Seven churches represent the universal church (Rev. 1:20).  It is necessary to forgive, not just seven times, but seventy times seven (Matt. 18:21-22, Gen. 4:24), that is to say, always.” (Oxford Guide to the Bible, pg. 562-3)

The most famous example of gematria most are familiar with is the reference in the Apocalypse to “666,” the number of the beast.  Biblical scholars have long considered it a usage of gematria, where John encoded the name of Nero Caesar or another contemporary Roman Emperor.  Biblical scholar Dr. Kenneth Gentry elucidates of “666”:  “‘This method, called gematria, or geometrical, that is, mathematical, was used by the Jews in exegesis of the Old Testament.’  The point is clear: cryptograms were common among the ancients, even among Christians.  Hence, the gematria in Revelation is not something created de novo by John; rather, the idea involved a familiar concept to the ancients.” (Before Jerusalem Fell: Dating of the Book of Revelation, pg. 196)

Another relevant association with “666” is the number squares that can be generated with that give rise to various speculations, but for the purposes of our discussion relate to the topic of magic squares. Biblical scholar E.W. Bullinger gives an example on page 286 of his Number in Scripture:


Bullinger’s number square of “666,” which gives 111 in all directions.

The number square is alleged to derive from the geometrical structure of the pattern found on the shell of a tortoise in ancient China (See “The Malekulan Journey of the Dead” by John Layard in Spiritual Disciplines: Papers From the Eranos Yearbooks).  Ancient mathematicians associated the number or magic square with various planets and planetary deities and their representative angelic sigils.  However, rather than fixating on the religious, it is my thesis that the number square also has a relation to cryptography and the rise of the computer.  Since the square gives an ordered regularity, it was reasonable to suppose that a machine might be constructed to calculate and encode.  I have written elsewhere of Leibniz’s speculations regarding a machine that would mirror the human mind, storing information and mirroring it back.  The medieval mythology of the golem also factored into this equation, linking once again gematria and Kabbalah, where the matrix of external reality itself could be imaged in a 2D virtual realm, which I will touch on later.  Before that, consider biblical scholar David Chilton’s arrangement of “666” in triangulation in his Days of Vengeance, page 349.
The triangulation of "666" produces a pyramid that recalls the tetraktys of Pythagoras, as well as other esoteric notions.

The triangulation of “666” produces a pyramid that recalls the tetraktys of Pythagoras, as well as other esoteric notions.

My purpose here is not to speculate as to the identity of an antichrist, but to look at how the ancient mind viewed numbers and symbols. One can see in these visual pictorals that recall Pythagoreanism the topological principles of mathematical abstraction that would be highly useful for statecraft in constructing ciphers.  One of the famous ancient examples of just such a cipher is known as the scytale, used by the Greeks.  Singh, in his Code Book gives an example of the syctale that resembles the tabled structure of a magic square.  Given that the Greek alphabet functioned as a number system like Hebrew did, the jump from magic squares to lettered codes is not a big leap.  It would therefore be natural to ancient man to encode messages in such a fashion.

When wrapped around the right size staff, the scytale revealed a hidden message.

When wrapped around the right size staff, the scytale revealed a hidden message.

At this point, it would be requisite to consider more historic examples of cryptography, its origins and usages.  One of the earliest is found in Greek historian Herodotus.  Herodotus describes the Greek danger presented by the invading Persian forces and the need for secret communications to help aid the cause:

“As the danger of discovery was great, there was only one way in which he could contrive to get the message through: this was by scraping the wax off a pair of wooden folding tablets, writing on the wood underneath what Xerxes intended to do, and then covering the message over with wax again. In this way the tablets, being apparently blank, would cause no trouble with the guards along the road. When the message reached its destination, no one was able to guess the secret, until, as I understand, Cleomenes’ daughter Gorgo, who was the wife of Leonides, divined and told the others that if they scraped the wax off, they would find something written on the wood underneath. This was done; the message was revealed and read, and afterwards passed on to the other Greeks.” (The Histories, Bk. V)

Likewise, in the case of Julius Caesar, we have examples of what would become known as the “Caesar Cipher,” in messages to Cicero. Suetonius recounts of this transposition process:

Caesar Salad Alphabet Soup Cipher.

Caesar Salad Alphabet Soup Cipher.

“There are also letters of his to Cicero, as well as to his intimates on private affairs, and in the latter, if he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out. If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others.” (Suetonius, The Lives of the Caesars, “Caesar,” No. 56)

The substitution cipher is the oldest form of encryption, but was not immune to being cracked, and this honor fell to the Arabs in the Middle Ages, who in fact invented the practice of cryptanalysis.  Singh comments:  “This simplicity and strength meant that the substitution cipher dominated the art of secret writing throughout the first millennium A.D.  Codemakers had evolved a system for guaranteeing secure communication, so there was no need for further development – without necessity, there was no need for further invention…..The breakthrough occurred in the East and required a brilliant combination of linguistics, statistics and religious devotion.

“Had Arabs been merely familiar with the use of monoalphabetic substitution cipher, they would not warrant a significant mention in any history of cryptography.  However, in addition to employing ciphers, the Arab scholars were also capable of destroying ciphers.  They in fact invented cryptanalysis, the science of unscrambling a message without knowledge of the key.  While the cryptographer develops new methods of secret writing, it is the cryptanalyst who struggles to find a weakness in these methods in order to break into secret messages.  Arabian cryptanalysts succeeded in finding a method for breaking the monoalphabetic substitution cipher, a cipher that had remained vulnerable for several centuries.” (Ibid., 15)

In fact, it was not merely Arabs who were interested in cracking cryptological codes, but medieval monastics and the Vatican, too, who were also skilled in the same arts.  Singh explains of the medieval monks who encountered another example of Jewish encoding in the text of Jeremiah:

“Medieval monks were intrigued by the fact that the Old Testament contained deliberate and obvious examples of cryptography. For example, the Old Testament includes pieces of text encrypted with atbash, a traditional form of Hebrew substitution cipher. Atbash involves taking each letter, noting the number of places it is from the beginning of the alphabet, and replacing it with a letter that is an equal number of places from the end of the alphabet. In English this would mean that a, at the beginning of the alphabet, is replaced by Z, at the end of the alphabet, b is replaced by Y, and so on. The term atbash itself hints at the substitution it describes, because it consists of the first letter of the Hebrew alphabet, aleph, followed by the last letter taw, and then there is the second letter, beth, followed by the second to last letter shin. An example of atbash appears in Jeremiah 25: 26 and 51: 41, where “Babel” is replaced by the word “Sheshach”; the first letter of Babel is beth, the second letter of the Hebrew alphabet, and this is replaced by shin, the second-to-last letter; the second letter of Babel is also beth, and so it too is replaced by shin; and the last letter of Babel is lamed, the twelfth letter of the Hebrew alphabet, and this is replaced by kaph, the twelfth-to-last letter.” (Singh, The Code Book, pg. 26)

Renaissance Europe was awash in intrigues and subterfuges that often called forth the use of encryption.  It is at this point we should shift back to the esoteric and consider Cornelius Agrippa, considered the father of western hermeticism.  Agrippa was accused of being a conjurer, but was also learned in the arts described above.  The Renaissance brought classical learning back into fashion and, as a result, the desire to crack hidden codes by the means of linguistics and numerology and gematria was again en vogue.  In the below section Agrippa is an excellent example of the associations and connections of numerology, theology, alchemy and techne.  Agrippa writes:

“God himself though he be only one in Essence, yet hath diverse names, which expound not his diverse Essences or Deities, but certain properties flowing from him, by which names he doth pour down, as it were by certain Conduits on us and all his creatures many benefits and diverse gifts; ten of these Names we have above described, which also Hierom reckoneth up to Marcella. Dionysius reckoneth up forty five names of God and Christ. The Mecubales of the Hebrews from a certain text of Exodus, derive seventy-two names, both of the Angels and of God, which they call the name of seventy two letters, and Schemhamphores, that is, the expository; but others proceeding further, out of all places of the Scripture do infer so many names of God as the number of those names is: but what they signifie is altogether unknown to us: From these therefore, besides those which we have reckoned up before, is the name of the Divine Essence, Eheia äéäà, which Plato translates wn, from hence they call God TO ON , others O UNthat is the being. Hu àåä is another name revealed to Esay, signifying the Abysse of the Godhead, which the Greeks translate TAUTON , the Latins, himself the same….

Vitruvian Man in Agrippa, recalling Kelley's essay.

Vitruvian Man in Agrippa, recalling Kelley’s essay.

Which the Ancient Doctors of the Hebrews have especially observed, who were wont to do many wonderful things by words; the Pythagorians [Pythagoreans] also have shewed, how to cure very wonderfully the diseases both of body and mind, with certain words; we read also, that Orpheus,being one of the Argonauts diverted a most fierce storm by certain words; in like manner that Apollonius, by certain words whispered, raised up a dead maide at Rome; and Philostratus reporteth that some did by certain words call up Achilles Ghost; and Pausanias relates, that in Lydia in the Cities of Hiero-Cesarea and Hypepis, were two temples consecrated to the Goddess whom they called Persica, in both of which when divine service was ended, a certain Magitian [magician], after he had laid dry wood upon the Altar, and in his native language had sang Hymnes, and pronounced certain barbarous words, out of a book which he held in his hand, presently the dry wood, no fire being put to it, was seen to be kindled, and burn most clearly. Also Serenus Samonicus delivereth amongst the precepts of Physick, that if this name Abracadabra be written, as is here expressed, viz.diminishing letter after letter backward, from the last to the first, it will cure the Hemitritean Fever or any other, if the sheet of paper or parchment be hanged about the neck, and the disease will by little and little decline and pass away.

a b r a c a d a b r a
a b r a c a d a b r
a b r a c a d a b
a b r a c a d a
a b r a c a d
a b r a c a
a b r a c
a b r a
a b r
a b

Cornelius Agrippa, Three Books of Occult Philosophy, Bk. III, XI

The pyramidal structure of abracadabra is reminiscent of the triangulation of “666” or the tetraktys.  It is not merely an encoded hermetic message, but also a geometric form – a triangle.  As an undergrad I read a large portion of volume 1 of Charles Heckethorn’s The Secret Societies of All Ages, and one aspect that came to the fore was the pigpen cipher.  Not only is the pigpen cipher an ancient method of secret communication, the nine squared box can also enclose all the letters of the English alphabet as well as the first 9 numerals (which make up all numbers).  It is easy to see how the magic square, the emergence of linguistics, number forms, the pigpen cipher and various esoteric ideas would all intertwine.  Yet aside from the religious and esoteric views, there is also the ever-present usage of these ideas by the state for secret communications.

The classic pigpen cipher.  When the "X" is laid over the #, the entire English alphabet is present.

The classic pigpen cipher. When the “X” is laid over the #, the entire English alphabet and the first 9 numerals are present.

Fast forward now to Renaissance England, and think of Dr. John Dee, the first “007,” and court astrologer for Queen Elizabeth.  Dee was involved in many intrigues, one of which was cryptology. However, as NSA scholar Leslie Rutledge explains, not a very good one.  In fact, despite the many legends of Dee as a conjurer talking to the dead with his crystal ball, the evidence seems to weigh in on Dee as a con man, calling to mind Agrippa.  Regardless, Dee is another example of the intersect of the esoteric and cryptography.  Rutledge writes in his “John Dee: Consultant to Queen Elizabeth”:

“Mathematics lifts the heart above the heavens by invisible lines, and by its immortal beams melteth the reflection of light incomprehensible, and so procureth joy and perfection unspeakable.” -Dr. John Dee citing Plato

“The book was notorious, I just now pointed out. Trithemius, the Abbot of Spaheim, began to write it in the year 1500, and he sent a partial copy of it to a clerical friend in another religious establishment. But unknown to Trithemius, his friend had died. His friend’s abbot opened the correspondence, and he was appalled. “Secret writings,” he read, “will reveal secrets not found by ordinary means.” And there was more. In order to send a secret message, you make an image of a planetary angel, speak the message over it at a moment determined by complicated astrological calculations, wrap the image up with an image of the addressee, and bury the images. This network of planetary angels could always be used for messages-and even for thought transference.

Cryptography, even of this heavenly sort, was not just a means of disguising messages; it was the medium through which intelligence from the spirit world might be transmitted. The secrets of the universe-the philosopher’s stone “The elixir of life-might be received in a heavenly cipher, like the obscure oracles of Delphi.” The abbot denounced Trithemius as a conjuror, trafficking with spirits, and he lost his clearance. Although he stopped all work on the Steganographia, the manuscript of it appears to have circulated as an underground classic for nearly a century until Dee copied it in 1563. was finally published in Frankfurt, near the end of Dee’s life, in 1606.

It was, you see, the supernatural context of the Steganography which attracted attention. Heads of state-or adventurers of all sorts could be persuaded that secrets of the future, hidden in the stars, and the marvelous formulae for prolonging life and for converting base metals into gold were knowable-and might be revealed by the supernal powers in cipher. It is hard perhaps to realize, but rational and wholly illusory notions like this could and did exist in the 16th Century scientific mind. Even Copernicus did not disbelieve in astrology. There were two gates to the other world. There was a gate of horn, through which came the rational finding which would lead to our times, and an extraordinary perception of the nature of man and his world. But there was also a gate of ivory, through which dreams and illusions came.”

According to Rutledge, Dee was not successful at this magical, astrological means of cryptography.  However, the essay does relate the story of Dee mentioning the ability to project images through screens, which I have noted elsewhere appears to relate to the seminal idea of the computer, and it is to Leibniz that we once again return.  Leibniz’s idea of a characteristica universalis would be instrumental in the development of calculation machines, arising from the project of a universal logic for all phenomena.  Milkov explains:

“The first variant of Leibniz‘s project for a new language was set out in a letter from Marin Mersenne to Descartes. In fact, Mersenne‘s idea was that of pasigraphy, a general language that helps one to understand all languages. In his reply to Mersenne of 11 November 1629, Descartes found this project rather interesting; however, he suggested a much wider variant of it: a project for ideography that mirrors human thoughts. This ideography would be connected with a mathesis universalis that could conceive of anything thinkable as a calculation. ―The greatest advantage of such a language would be the assistance it would give to men‘s judgment, representing matters so clearly that it would be almost impossible to go wrong.” (Nikolay Milkov, “Leibniz Project for a Characteristica Universalis in Relation to the Early Analytical Philosophy,” pg. 2)

Amazingly, Leibniz wrote of a possible “imagined” machine:

“17. It must be confessed, moreover, that perception and that which depends on it, are inexplicable by mechanical causes, that is by figures and motions.  And, supposing that there were a machine so constructed as to think, feel and have perception, we could conceive of as enlarged and yet preserving the same proportions, so that we might enter into it as into a mill.  And this granted, we should only find on visiting it, pieces which push one against another, but never anything by which to explain a perception.  This must be sought for, therefore, in the simple substance and not in the composite or in the machine.  Furthermore, nothing but this (namely perception and their changes) can be found in the simple substance.  It is also in this alone that all the internal activities of simple substances can consist.  18. The name of entelechies might be given to all simple substances or created monads, for they have within themselves a certain perfection; there is a certain sufficiency which makes them sources of internal activities, and so to speak, incorporeal automata.” (pg. 536)

Grandfather Patriarch to all Computers.

Grandfather Patriarch to all Computers.

In Leibniz, the father of calculus, the convergence of symbology and earlier cryptographic and esoteric ideas combine to produce a further exposition and advance on the idea of creating a logic machine that functioned like a mind.  While my intention here is not to delve into the history of the computer, it is worth considering that the history of cryptography and cryptanalysis was directly connected to the emergence of the idea of the computer.  Only in a world where mathematical principles are “mirrored” from the realm of forms to our external world could such a machine function.  As you read this, you are in fact using the very thing described – a machine that transmits encrypted information from one person to another.

Physicist Paul Davies relates an interesting story about the advancement of computers by Los Alamos Laboratory scientists that also recalls Leibniz’s walk-in computer, based on the same principle of universal logic and a characteristica universalis.  This time, however, the purpose is to mimic life.  Davies explains:

“The fact that universal computers can simulate each other has some important implications.  On the practical level it means that, properly programmed and with enough memory space bolted on, a modest IBM PC can perfectly imitate, say, a powerful Cray computer as far as output (not speed) is concerned.  In fact, a universal computer need be nowhere as sophisticated as an IBM PC.  It might consist of nothing more than a checkerboard and a supply of checkers! Such a system was first studied by the mathematicians Stanislaw Ulam and John von Neumann in the 1950s as an example of what is called “game theory.”  Ulam and von Neumann were working at the Los Alamos National Laboratory, where the Manhattan atomic bomb project was conducted….He [von Neumann] was fascinated to know whether a machine could in principle be built that is capable of reproducing itself, and if so, what its structure might be.  If such a von Neumann machine is possible, then we would be able to understand the principles that enable biological organisms to reproduce themselves.  The basis of von Neumann’s analysis was the construction of a “universal constructor” analogous to a “universal computer.” This would be a machine programmed to produce anything, much as a Turing machine can be programmed to execute any computable mathematical operation.” (Paul Davies, The Mind of God: The Scientific Basis for a Rational World, pgs. 111-2)

In Leibniz, the principle of gnomonicity is applied to the monads, and with computers, supercomputers and personal computers, the same gnomonic principle applies.  This is reminiscent of Chilton’s trangulation of “666,” where removing one layer leaves a smaller, yet same shape.  The point here is that the gnomonic principle is based on the mirroring principle, that what is true in thought, logic and nature is also true from the macro-scale to the micro-scale.  It is in this way that the secrets of nature encode the rites of the gods. What we see at the subatomic level mirrors what we see in galaxies and the solar system.  Wisdom 11:20 states, “But you have disposed all things by measure and number and weight.”  However, that scientists will create a “sentient” computer is impossible, given the objective truth of Godel’s Theorums and the impossibility of accounting for all infinite potentialities.  AI scientist and semiotician Douglas Hofstadter comments:

“Clearly there is much more going on in typefaces than meets the eye–literally.  The shape of letterform is a surface manifestation of deep mental abstractions.  It is determined by conceptual considerations and balances that no finite set of merely geometric knobs could capture.  Underneath or behind each instance of “A” there lurks a concept, a Platonic entity, a spirit, This Platonic entity is not an elegant shape such as the Univers A, not a template with a finite number of knobs, not a topological or grouping-theoretical invariant in some mathematical heaven, but a mental abstraction–a different sort of beast.  Each instance of the “A” spirit reveals something new about the spirit without ever exhausting it.  The mathematization of such a such a spirit would be a machine with a specific set of knobs on it, defining all its “loci of variability” for once and for all.  I have tried to show that to expect this is simply not reasonable.” (Douglas Hofstadter, Metamagical Themas: Questing for the Essence of Mind and Pattern, pg. 279)

In other words, there is clearly something beyond the letter on paper, the letter spoken, and the letter in mind.  Something invariant and not bound by time must link all these particular instantiations, and thus by the wayside falls reductionist materialism (though they are almost incapable of grasping this).  The danger is not from sentient supercomputers like some ridiculous Hollywood blockbuster, but from the actual supercomputer spy grid that was erected under the auspices of the Cold War.  in his 1982 book on the NSA, James Bamford mentions a curiously titled cryptographic program:

“The timing could not have been better for IBM, which submitted for consideration its Lucifer cipher.  Labeled by David Kahn “the tiniest known ‘cipher machine’ ever produced,” Lucifer actually consisted of a thumbnail-sized silicon “chip” containing an extremely complex integrated circuit.  The “key” to the cipher was a long string of bits – 0s and 1s – the combination of which would vary from user to user…From the very beginning, the NSA had taken an enormous interest in Project Lucifer.” (James Bamford, Puzzle Palace, pg. 435)

First, remove the chip in your all-seeing eye.

First, remove the chip in your all-seeing eye.

Along the same lines, mathematician Calvin Clawson expands on this program in his 1996 book, Mathematical Mysteries, which shows the level of advanced surveillance that existed in the 90s! Clawson says:

“The German version of this [cipher] machine was called the Enigma, on of which was obtained by the British.  The Enigma, in conjunction with cryptanalysis techniques allowed the British to decipher many German messages, which significantly altered World War II’s outcome….Companies and governments worldwide are not adopting the public-key cipher system. RSA Data Security, Inc. has grown to  be the leading cryptographic marketing company in the nation….

With the phenomenal growth in the use of public-key encryption methods, such as the RSA system, we might be led to believe that public key codes will soon become the national, or even world standard.  However, the U.S. Government has been fighting to avoid such a situation.  The National Security Agency of the U.S. Government is responsible for breaking the codes of foreign governments- they are our secret spy agency.  But the NSA knows it cannot break the public key-codes….No wonder the NSA is upset about the RSA success story.

The government has not been idle, and is now working on a competing system to public-key encryption. In 1987, Congress authorized NIST to develop an acceptable encryption system that would satisfy the needs of user privacy, yet allow law enforcement agencies and the NSA to decipher transmitted messages.  This effort became the Capstone Project.  Under Capstone, a computer chip, called a Clipper Chip, would be manufactured and installed in computers that interface with the U.S. Government.” (Mathematical Mysteries, pgs. 186, 199-200)

Lucifer and Capstone: Names undoubtedly imbued with esoteric significance.  Even in my semi demythologizing project in this essay, I am unable to avoid esoteric notions as we move into the 20th century.  It seems that cyrptography, which developed from ancient message writing and gematria, and eventually produced the Enigma machine of World War II and the computer itself, is still deeply related to occult ideas.  Does that mean we can decode Lagarde’s cipher?  We may not have all the keys for her message, but what we do have is a grounding in the understanding that Lagarde is primarily using her message as a message of statecraft, as old as the art of language itself.  Whether one regards the “magic” as real or not, one thing we can be certain of is statecraft and cryptography.

What of gods, then? Must we conclude that it is all statecraft and sciencia and techne, man in search of secret ways of communicating and being, apart from anything religious?  No, not at all. Man is more religious than ever, only his gods have changed.  Instead, just as we plumb the depths of nature and science, like Hofstadter’s comments on the Platonic nature of signs and symbols, each new revelation conceals as much as it reveals.  We are not left with a dry, barren Enlightenment rationalism, nor are we returning to an ancient superstition.  We are involved in the ever-progressing revelation of reality that spirals for all eternity, as St. Gregory of Nyssa wrote, up, eternally into the divine.  It’s not dialectics, it’s a principle of unification, and synthesis, and not in a Hegelian sense (Hegel’s view was based on dialectical tension). This eternal learning constantly removes superstition as it simultaneously invites us deeper into theological mystery.  It is the acceptance of paradox, which is very different from a contradiction in philosophy, that is the appropriate (and Eastern) attitude.

17 thoughts on “Cryptography of the Cryptocracy: Of Gods and Computers

  1. Pingback: Cryptography of the Cryptocracy: Of Gods and Computers | State of Globe

  2. Pingback: Cryptography of the Cryptocracy: Of Gods and Computers - Wide Awake America

  3. Fine job.Goes to show that there is nothing new under the sun in the final analysis.Computers instead of scrolls.Scientists in place of priests,and so on.Dee was an odd admixture of illusionist,charlatan and puppetmaster.Nice tie-in with the NSA.Before Bamford’s works,it was always the CIA discussed in conspiracy circles.The NSA is a behemoth of an agency.

  4. I think Hoffman believes Lagarde’s “sevens” are in reference to the 21st century being the “gateway” for the final stage of what the alchemists of old sought: in Hoffman’s words, the creation of a Necropolis where an obsession with dead matter, technology, and a command and control grid would allow the elite initiates to “cheat death.” This also seems to involve the “return of the old gods” and an overturning of God’s order as the necessary precondition to accepting the inversion of good and evil. In this regard, he sees a certain continuity between John Dee’s cipher as “007” and the 21st century as the filling in of the other two 7s, that is, the completion of “777.” For those interested, his Revisionist Newsletter devoted to the death of Princess Diana goes into more detail, connecting the dots and unmasking what the final end game is all about. I think it’s Newsletter 4 or 12 — I can’t remember; you’ll have to check on his website if you’re interested.

  5. Pingback: Cryptography of the Cryptocracy: Of Gods and Computers - Wide Awake America

  6. Evocative article to say the least!

    If you aren’t yet familiar, I highly encourage you to look up the work of Stan Tenen at You’ll also find his seminal talk Geometric Metaphors Of Life floating around on YouTube. Given the nature of the various subjects you touch on in your writing it may be another valuable ‘key’ in your research. Cheers

  7. Pingback: Great Game Theory: A Numbers Station in Your Pocket | Jay's Analysis

  8. Pingback: Great Game Theory: A Numbers Station in Your Pocket | World Liberty News

  9. Pingback: Great Video game Theory: A Numbers Station in Your Pocket - 2 Real News

  10. Pingback: Numbered Man – An Analysis of The Prisoner (1967) | Jay's Analysis

  11. Pingback: The Prisoner: A Deep-State Analysis | Espionage History Archive

  12. Pingback: How the individual was broken by the modern world |

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s